SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. II (Jan. 2014), PP 75-79
www.iosrjournals.org
www.iosrjournals.org 75 | Page
An Improvement on Route Recovery by Using Triangular Fuzzy
Numbers on Route Errors in MANET
Sara Aliabadi¹, Mehdi Agha Sarram¹
¹Department of Computer Science, Islamic Azad University Science and Research Branch Yazd, Yazd, Iran
Abstract: Based on mobile nature in MANET, there is no doubt that all routing protocols have some route
errors. Usually, routing protocols try to recover a route after a route error has been happened on an exact route
to destination. This kind of route recovery could make more packet loss and also more time waste. This project
adds Triangular Fuzzy Numbers to prediction of route errors and make route recovery as parallel of packet
sending. Indeed, any node in this project uses a route error counter and an error prediction based on Fuzzy
algorithm to recover its routes before an exact route error on its route discovery has been happened. There is
no doubt that using suggested prediction cannot solve all route errors; but it could help routing protocols to
improve their route recovery algorithm.This project uses DSR as one of the standard MANET routing protocols
to simulate the results.
Keywords: MANET, Fuzzy, Triangular Numbers, DSR, Routing
I. Introduction
A wireless mobile ad hoc network (MANET) is a particular type of wireless network in which an
association of mobile nodes forms a multi-hop radio temporary network in a decentralize manner without any
support of a fixed infrastructure. Each mobile node acts as both a terminal and a router, and the control of the
network activity is distributed to these nodes. Mobile nodes communicate over wireless links which typically
have less bandwidth than wired networks. In addition, mobile nodes have lower battery power and lower
computation ability. The network topology is generally dynamic because the connectivity among the nodes may
change with time due to nodal mobility, the effect ofradio communication, and power limitations. Thesefeatures
of MANET have posed a lot of challenges indesigning an effective, reliable and scalable routingprotocol.
Lost routes recovery is one of the major challenges in MANET routing protocols which could make a route
more or less effective on packet loss during packet sending. Usually, routing protocols in MANET provide route
error to inform other nodes that a node is gone and route through that node are not usable any more. In this case,
node will recover their routes after a route error has been happened. Thus, packets which are sent during route
recovery will lose.
A fuzzy number is a quantity whose value is imprecise, rather than exact as is the case with "ordinary"
(single-valued) numbers. Any fuzzy number can be thought of as a function whose domain is a specified set
(usually the set of real numbers, and whose range is the span of non-negative real numbers. Triangular Fuzzy
Numbers use three sets of value to estimate the average situation of any system.
First part of this article is to explain DSR and how it works. Then, the second part is going to determine Fuzzy
Triangular Numbers and project suggestion to predict route error. Finally, we simulate our findings by NS2 to
prove our recovery improvement on MANET routing.
II. DSR
A Mobile Ad Hoc Network, also called a MANET, is an autonomous collection of mobile nodes
forming a dynamic wireless network. The administration of such a network is decentralized. In this kind of
network each node acts both as host and router and forwards packets for nodes that are not within transmission
range of each other. A MANET provides a practical way to rapidly build a decentralized communication
network in areas where there is no existing infrastructure or where temporary connectivity is needed.
The changing topology of MANETs and use of the wireless medium justify the need fordifferent routing
protocols than those developed for wired networks or multi-cell environments.Various routing protocols have
been proposed in the IETF MANET working group to addressthe problem of decentralized routing.
The Dynamic Source Routing (DSR) protocol was designed especially for MANET applications. Its
main feature is that every data packet follows the source route stored in its header. This route gives the address
of each node through which the packet should be forwarded in order to reach its final destination. Each node on
the path has a routing role and must transmit the packet to the next hop identified in the source route.
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
www.iosrjournals.org 76 | Page
Each node maintains a Route Cache in which it stores every source route it has learned. When a node needs to
send a data packet, it checks first its route cache for a source route to the destination. If no route is found, it
attempts to find one using the route discovery mechanism.
A monitoring mechanism, called route maintenance, is used in each operation along a route. This
mechanism checks the validity of each route used.
The route maintenance mechanism ensures that the paths stored in the route cache are valid. If the data link
layer of a node detects a transmission error, the node creates a Route Error packet and transmits it to the original
sender of the data packet. This Route Error packet indicates which link is “broken”. When a node receives a
Route Error packet, it removes the link in error from its route cache and for each route containing this link,
truncates the route from the hop before the broken link.
III. Fuzzy Triangular Numbers and Recovery Algorithm
Route updating can help routing protocols to reduce packet loss and improve QoS. Indeed, MANETs
have a mobile nature; so topology changes in them frequently. This mobile nature effects on the routes and
make them unusable after a while. So, all MANET routing protocols need a route updating algorithm.
In this project, we use Triangular Fuzzy Numbers to make the route updating time dependent. In this case, we
forecast a time for route updating and make this time error dependent based on Triangular Numbers. If the route
error came from a direct node in a route, other nodes will update that route immediately. Otherwise, nodes
which received route error will increase their route error counter and operate triangular equation. The result of
Triangular equation should multiply to forecast time and subtract from it.
In order to consider the fuzzy route recovery using the triangular fuzzy numbers which were based on statistical
data, we need the following definitions.
Definition 1: A fuzzy set is called a level α fuzzy interval, where 0 ≤ α ≤ 1 and we denote it by [p,q;α], if its
membership function is:
[ ]( ) { (1)
Definition 2: ã is called a fuzzy point, if its membership function on R = (− ∞, ∞) is
( ) { (2)
The family of all fuzzy sets on R which we denote as satisfies the following two conditions. Let D∈Fs.
ThenDsatisfies ( ) and ( ) below.
( ) The left and right hand side of the α-level set of D, ( ) and ( ) exist. We denoteit as D(α) =
[ ( ) ( )].
( ) ( ) and ( ) are integrable for α ∈ [0, 1].
By using Triangular definition, we can reach the following equation to guess when a route protocol should
update or recover its route table.
( )
{
∈ ( ]
∈ ( ]
(3)
By using equation 3, we can divide mobile network errors to five parts. First, if the error comes from exact node
on the route, other nodes will recover their routes immediately. Otherwise, they count the route errors and put
the counter in equation 3. In this case, if the route errors were less than a, the network is safe and they do
recovery as usual. While, if the route errors go over than a and less than m, they will multiply the result of
equation 3 to their usual recovery time and subtract the result from left recovery time. It will be same for route
errors which are more than m and less than b. For route errors which are more or equal by b, the network is not
safe and nodes will recover their route immediately. Note that, in this case, the route error counter will be
change to zero after any route recovery.
IV. Simulation Results
We addour findings on DSR and simulated it by NS2 for 5, 10, 15, 20, 25, 30, 35, and 40 nodes. Whereas
every simulation results may have some exceptions, we simulated the F-DSR in some times and made our
decision based on their average.
1.1 End to End Delay
End to End Delay is the most important result to prove the success of each routing protocol. The results
of simulation show that the F-DSR works more proper than standard DSR. We can see that the End to End
Delay in F-DSR is less than Standard DSR. Also, F-DSR has more success during node population increment.
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
www.iosrjournals.org 77 | Page
1.2 Packet Delivery Rate
Packet Delivery Rate is our final comparison between F-DSR and Standard DSR. There is no doubt that the
results of simulation show that the packet delivery rate increased in F-DSR compare on Standard ones.
V. Conclusion
Based on MANET mobility nature, there is always some route errors during packet sending. Usually,
MANET routing protocols recover their routes after a route error has been happened. This kind of route
recovery may cause to increase packet loss during packet sending. In this project we added Fuzzy Triangular
Numbers into routing protocols in MANET to predict route errors and do route update in parallel of packet
sending. For simulating our findings, we added our error prediction in DSR and simulated it by NS2. The results
show that our route recovery algorithm can help DSR to reduce packet loss percentage and end to end delay by
parallel route recovery.
Reference
[1] Abdullah, J., (2010), Multiobjectives GA-Based QOS Routing Protocol for Mobile Ad Hoc Network, International Journal of Grid
and Distributed Computing, 3(4), 57-68.
[2] Aghdasi, H. S., Torabi, N., Rahmanzadeh, A., Aminiazar, M., and Abbaspour, M., (2012), Usefulness of multicast routing protocols
for vehicular Ad-hoc networks, Sixth International Symposium Telecommunications (IST), 459-463.
[3] Ahn, Ch. W., and Ramakrishna, R. S., (2002), A Genetic Algorithm for Shortest Path Routing Problem and the Sizing of
Populations, IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 6(6), 132-138.
[4] Ahn, Ch., W., and Ramakrishna, R., S., (2002), A Genetic Algorithm for Shortest Path Routing Problem and the Sizing of
Populations, IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 6(6), 566-579.
[5] Al-Ghazal, M., El-Sayed, A., and Kelash, H., (2007), Routing Optimlzation using Genetic Algorlthm in Ad Hoc Networks, IEEE
International Symposium on Signal Processing and Information Technology, 497-503.
[6] Alzate, M., A., Salamanca, M., P., Pena, N., M., and Labrador, M., A., (2007), End-to-End Mean Bandwidth Estimation as a
Function of Packet Length in Mobile Ad Hoc Networks, IEEE, 415-420.
[7] Anand, V., Sairam, N., and Thiagajan, M., (2012), A Review of Routing in Ad Hoc Networks, Research Journal of Applied
Sciences, Engineering and Technology, 4(8), 981-986.
[8] Artimy, M., M., Robertson, W., and Philips, W., j., (2006), Assignment of Dynamic Transmission Range Based on Estimation of
Vehicle Density, Engineering Mathematics and Internetworking, 40-48.
[9] Barati, J., (2011), Evaluation of intelligent algorithms in Routing Mobile Ad hoc Networks, Mashhad PayamNour University.
[10] Barolli, A., Takizawa, M., Xhafa, F., and Barolli, L., (2010), Application of Genetic Algorithms for QoS Routing in Mobile Ad-Hoc
Networks: A Survey, International Conference on Broadband, Wireless Computing, Communication and Applications, 250-259.
0
0.5
1
1.5
5 10 15 20 25 30 35
Time(Sec)
Number Of Nodes
End to End Delay
DSR
F-DSR
0
20
40
60
80
100
120
5 10 15 20 25 30 35 40
Time(Sec)
Number of Nodes
Packet Delivery Rate (% Successed Packets /
Number of Nodes)
DSR
F-DSR
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
www.iosrjournals.org 78 | Page
[11] Barolli, L., Koyama, A., and Shiratori, N., (2003), A QoS Routing Method for Ad-Hoc Networks Based on Genetic Algorithm,
International Workshop on Database and Expert Systems Applications, 14, 1-5.
[12] Chiang, Ch,.Gerla, M., and Zhang, L., (1998), Forwarding Group Multicast Protocol (FGMP) for Multihop, Mobile Wireless
Networks, CLUSTER COMPUTING, 1-16.
[13] Deb, K., Dhebar, Y., D., and Pavan, N., V., R., (1998), Non-Uniform Mapping in Binary-Coded Genetic Algorithms, Kanpur
Genetic Algorithms Laboratory (KanGAL).
[14] Denardin, G., W., Barriquello, C. H., Campos, A., and Prado, R. N., (2011), A Geographic Routing Hybrid Approach for Void
Resolution in Wireless Sensor Networks, Journal of Systems and Software, 10(84), 1577-1590.
[15] Du, K., and Yang, Y., (2010), A QoS routing for Maximum Bandwidth in Ad Hoc Networks, International Conference on Future
Networks, 343-345.
[16] Duncan, N., and Eddie, B. T., (2012), An Energy-Efficient Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks,
International Journal of Computing and ICT Research, 2(6), 23-32.
[17] Fuhrmann, Th., Pengfei, D., Kutzner, K., and Cramer, C., (2006), Pushing Chord into the Underlay: Scalable Routing for Hybrid
MANETs (PDF). System Architecture Group, Technical University of Karlsruhe (TH).
[18] Gani, A., Han, Q., Anuar, N. B., and Zakaria, O., (2009), Enhancing DSR Protocol Performance in Mobile Ad-Hoc Networks Using
ACK Reply, WSEAS Transactions on Communications, 2(8), 227-236.
[19] Goyal, M., Soperi, M., Bacceli, E., Chaudhury, G., Shahik, A., Hosseini, H., and Trivedi, K., (2012), Improving Convergence Speed
and Scalability in OSPF: A Survey, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 14(2), 443-463.
[20] Grover, D., and Singh, G., (2012), Implementation: DSR & AODV, International Journal of Computer Application, 2(5), 66-79.
[21] Guizani, B., Ayeb, B., Koukam, A., (2012), A New Cluster-Based Link State Routing for Mobile Ad Hoc Networks, IEEE, The 2nd
International Conference on Communications and Information Technology (ICCIT): Communication Networks and Systems,
Hammamet, 2 , 196-201.
[22] Gujral, R., Rana, S., and Chaudhari, A., (2012), Study and Comparison of Mesh and Tree Based Multicast Routing Protocols for
MANETs, International Journal of Latest Trends in Engineering and Technology (IJLTET), 1(2), 58-65.
[23] Gulati, M., K., and Kumar, K., (2013), A Review of QoS Routing Protocols in MANETs, International Conference on Computer
Communication and Informatics, 1-6.
[24] Hao, L., (2009), The QoS Routing Protocol in the Ad Hoc Networks, International Conference on Networking and Digital Society,
101-103.
[25] Hosseini Seno, S. A., Budiarto, R., and Wan, T. Ch., (2011), A Secure Mobile Ad hoc Network Based on Distributed Certificate
Authority, Arabian Journal for Science and Engineering, 2(36), 245-257.
[26] Hwang, R., H., Do, W., Y., and Yang, Sh., Ch., (2000), Multicast Routing Based on Genetic Algorithms, JOURNAL OF
INFORMATION SCIENCE AND ENGINEERING, 16, 885-902.
[27] Johnson, D., B., Maltz, D., A., and Broch, J., (2001), DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc
Networks, Monarch, 1-25.
[28] Johnson, D., Hu, Y., and Maltz, D., (2007), The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4
(RFC 4728), IETF, 1-107.
[29] Karibasappa, A., S., G., and Muralidhara, K., N., (2011), Neuro Fuzzy Based Routing Protocol for Mobile Ad-Hoc Networks,
International Conference on Industrial and Information Systems, 6, 216-221.
[30] Katoch, Sh., and Aggarwal, R., (2013), Enhancement in DSR Protocol for Load Balancing and Congestion Control, Global Journal
of Computer Science and Technology Network, Web and Security, 7(13),
[31] Kaur, N., and Singh, M., (2012), Effects of Caching on the Performance of DSR Protocol, IOSR Journal of Engineering
(IOSRJEN), 2(9), 7-11.
[32] Kojic, N., S., Ivancic, M., B., Z., Reljin, I., S., and Reljin, B., D., (2010), New Algorithm for Packet Routing in Mobile Ad-hoc
Networks, JOURNAL OF AUTOMATIC CONTROL, UNIVERSITY OF BELGRADE, 20, 9-16.
[33] kosko, B., (1993), Fuzzy Thinking, Hyperion, New York.
[34] Kumar, M. and Mishra, R. (2012), An Overview of MANET: History, Challenges and Applications, Indian Journal of Computer
Science and Engineering (IJCSE), 3, 121-125.
[35] Kunz, Th., and Alhalimi, R., (2010), Energy-efficient proactive routing in MANET: Energy metrics accuracy, Ad Hoc Networks,
7(8), 755-766.
[36] Latiff, L., A., and Fisal, N., (2003), Routing Protocols in Wireless- Mobile Ad Hoc Network - A Review, IEEE, 600-604.
[37] Liu, H., Li, J., Zhang, Y., Q., and Pan, Y., (2005), An Adaptive Genetic Fuzzy Multi-path Routing Protocol for Wireless Ad-Hoc
Networks, International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed
Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, 6, 1-8.
[38] Lou, Y., Zhang, W., and Hu, Y., (2010), A New Cluster Based Routing Protocol for VANET, Second International Conference on
Networks Security, Wireless Communications and Trusted Computing, 48, 176-180.
[39] Michalewicz, Z., (2001), Genetic Algorithms, Numerical Optimization, and Constraints, Polish Academia of Science, 1-8.
[40] Mohammed, A., A., and Nagib, G., (2012), Optimal Routing In Ad-Hoc Network Using Genetic Algorithm, Int. J. Advanced
Networking and Applications, 3(5), 1323-1328.
[41] Nallusamy, R., Duaiswamy, K., Muthukumar, D., and Sathiakumar, C., (2010), Energy efficient dynamic shortest path routing in
Wireless Ad hoc Sensor Networks using Genetic Algorithm, ICWCSC.
[42] Perkins, Ch., E., and Royer, E., M., (1997), Ad-hoc On-demand Distance Vector Routing, IEEE, 1-11.Perkins, Ch., E., and Royer,
E., M., (2003), Ad hoc On-Demand Distance Vector (AODV) Routing (RFC 3561), IETF, 1-37.
[43] Ragunath, V., (2004), Implementation of DSR Protocol in NS2 simulator, University of Bonn, Informatik Department IV, 1-5.
[44] Ramesh, V., Subbaiah, P., and Supriya, K., (2010), Modified DSR (Preemptive) to Reduce Link Breakage and Routing Overhead
for MANET Using Proactive Route Maintenance (PRM), Global Journal of Computer Science and Technology, 5(9), 124-129.
[45] Rifa-Pous, H., and Herrera-Joancomarti, J., (2011), Computational and Energy Costs of Cryptographic Algorithms on Handheld
Devices, Future Internet, 3, 31-48.
[46] Roshankar, R., Bhatia, R., Shrivatava, V., and Sharma, D., K., (2012), Performance Analysis of Various Routing Protocols
(Proactive and Reactive) for Random Mobility Models of Adhoc Networks, Recent Advances in Information Technology, 1, 1-5.
[47] Royer, E., M., (1999), A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, IEEE Personal
Communications, 99 , 46-55.
[48] Saeed, N., H., Abbod, M., F., and Al-Raweshidy, H., S., (2012), MANET Routing Protocols Taxonomy, International Conference
on Future Communication Networks, 123-128.
[49] Saleh, R., O., M., Saman, M., Y., M., and Rahman, M., N., A., (2012), Fresh Shortest Route Algorithm for DSR Protocol in Mobile
Ad-Hoc Networks, International Annual Symposium on Sustainability Science and Management, 11, 1068-1073.
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
www.iosrjournals.org 79 | Page
[50] Sarr, Ch., Chaudet, C., Chelius, G., and Lassous, I., G., (2005), A node-based available bandwidth evaluation in IEEE 802.11 ad
hoc networks, International Journal of Parallel, Emergent and Distributed Systems, 1-21.
[51] Sihai, Zh., Layuan, L., and Yong, L. (2011), A QoS-based Routing Algorithm in Ad Hoc Network, International Symposium on
Distributed Computing and Applications to Business, Engineering and Science, 10, 23-26.
[52] Tan, K., Zhang, Q., and Zhu, W., (2003), Shortest Path Routing in Partially Connected Ad Hoc Networks, GLOBECOM, 1038-
1042.
[53] Tong, F., Tang, W., Peng, L., Xie, R., Yang, W., and Kim, Y., (2010), A Node-Grade Based AODV Routing Protocol for Wireless
Sensor Network, 2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing
(NSWCTC), 2, 180-183.
[54] Wismanath, K., Obraczka, K., and Tsudik, G., (2005), Exploring Mesh- and Tree Based Multicast Routing Protocols for MANETs,
1-45.
[55] Wu, H., and Jia, X., (2007), QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad hoc networks, FFCSA, 559-612.
[56] Xiaochuan, X., Gang, W., Keping, W., Gang, W., and Shilou, J., (2009), Link reliability based hybrid routing for tactical mobile ad
hoc network, Journal of Systems Engineering and Electronics, 2(19),259-267.
[57] Yeh, Ch., T., (2009), Approximations by interval, triangular and trapezoidal fuzzy numbers, IFSA-EUSFLAT, 143-148.
[58] Zafar, H., Hassan, L., Khattak, A., Mufti, Z., and Jan, S., (2012), Implementation of the Dynamic Source Routing Protocol in
Network Simulator 2 – An Overview, SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES), 44(3), 491-496.

More Related Content

What's hot

A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksChandan Thakur
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
 
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A ReviewIRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A ReviewIRJET Journal
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
A new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocolA new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocolIAEME Publication
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantificationijwmn
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 

What's hot (20)

A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networks
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
 
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A ReviewIRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Ge3411331139
Ge3411331139Ge3411331139
Ge3411331139
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
A new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocolA new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocol
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantification
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
B03406010
B03406010B03406010
B03406010
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 

Viewers also liked

Performance Analysis of Rake Receivers in IR–UWB System
Performance Analysis of Rake Receivers in IR–UWB System Performance Analysis of Rake Receivers in IR–UWB System
Performance Analysis of Rake Receivers in IR–UWB System IOSR Journals
 
Establishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing IndustryEstablishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing IndustryIOSR Journals
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageIOSR Journals
 
Text Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaText Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaIOSR Journals
 
A Utility Interactive Electricity Generation Schemes with Renewable Resources
A Utility Interactive Electricity Generation Schemes with Renewable ResourcesA Utility Interactive Electricity Generation Schemes with Renewable Resources
A Utility Interactive Electricity Generation Schemes with Renewable ResourcesIOSR Journals
 
Towards Web 3.0: An Application Oriented Approach
Towards Web 3.0: An Application Oriented ApproachTowards Web 3.0: An Application Oriented Approach
Towards Web 3.0: An Application Oriented ApproachIOSR Journals
 
A Comparative Study of Tourism Industry in North-Eastern States of India
A Comparative Study of Tourism Industry in North-Eastern States of IndiaA Comparative Study of Tourism Industry in North-Eastern States of India
A Comparative Study of Tourism Industry in North-Eastern States of IndiaIOSR Journals
 
Anisotropic Bianchi Type-III Dark Energy Model with Time-Dependent Decelerati...
Anisotropic Bianchi Type-III Dark Energy Model with Time-Dependent Decelerati...Anisotropic Bianchi Type-III Dark Energy Model with Time-Dependent Decelerati...
Anisotropic Bianchi Type-III Dark Energy Model with Time-Dependent Decelerati...IOSR Journals
 
Supplier ranking and selection in a bakery
Supplier ranking and selection in a bakerySupplier ranking and selection in a bakery
Supplier ranking and selection in a bakeryIOSR Journals
 
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...IOSR Journals
 
A new universal formula for atoms, planets, and galaxies
A new universal formula for atoms, planets, and galaxiesA new universal formula for atoms, planets, and galaxies
A new universal formula for atoms, planets, and galaxiesIOSR Journals
 
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...IOSR Journals
 
On Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating TypeOn Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating TypeIOSR Journals
 
Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...
Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...
Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...IOSR Journals
 
Chitosan capped Silver nanoparticles used as Pressure sensors
Chitosan capped Silver nanoparticles used as Pressure sensorsChitosan capped Silver nanoparticles used as Pressure sensors
Chitosan capped Silver nanoparticles used as Pressure sensorsIOSR Journals
 
Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...
Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...
Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...IOSR Journals
 
“Influence of Behavioral Biases on Cognitive Abilities”
“Influence of Behavioral Biases on Cognitive Abilities”“Influence of Behavioral Biases on Cognitive Abilities”
“Influence of Behavioral Biases on Cognitive Abilities”IOSR Journals
 
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...IOSR Journals
 
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous WorkoutChanges During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous WorkoutIOSR Journals
 

Viewers also liked (20)

Performance Analysis of Rake Receivers in IR–UWB System
Performance Analysis of Rake Receivers in IR–UWB System Performance Analysis of Rake Receivers in IR–UWB System
Performance Analysis of Rake Receivers in IR–UWB System
 
Establishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing IndustryEstablishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing Industry
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
 
Text Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaText Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With Ica
 
A Utility Interactive Electricity Generation Schemes with Renewable Resources
A Utility Interactive Electricity Generation Schemes with Renewable ResourcesA Utility Interactive Electricity Generation Schemes with Renewable Resources
A Utility Interactive Electricity Generation Schemes with Renewable Resources
 
Towards Web 3.0: An Application Oriented Approach
Towards Web 3.0: An Application Oriented ApproachTowards Web 3.0: An Application Oriented Approach
Towards Web 3.0: An Application Oriented Approach
 
A Comparative Study of Tourism Industry in North-Eastern States of India
A Comparative Study of Tourism Industry in North-Eastern States of IndiaA Comparative Study of Tourism Industry in North-Eastern States of India
A Comparative Study of Tourism Industry in North-Eastern States of India
 
Anisotropic Bianchi Type-III Dark Energy Model with Time-Dependent Decelerati...
Anisotropic Bianchi Type-III Dark Energy Model with Time-Dependent Decelerati...Anisotropic Bianchi Type-III Dark Energy Model with Time-Dependent Decelerati...
Anisotropic Bianchi Type-III Dark Energy Model with Time-Dependent Decelerati...
 
F0562732
F0562732F0562732
F0562732
 
Supplier ranking and selection in a bakery
Supplier ranking and selection in a bakerySupplier ranking and selection in a bakery
Supplier ranking and selection in a bakery
 
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
 
A new universal formula for atoms, planets, and galaxies
A new universal formula for atoms, planets, and galaxiesA new universal formula for atoms, planets, and galaxies
A new universal formula for atoms, planets, and galaxies
 
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...
 
On Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating TypeOn Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating Type
 
Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...
Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...
Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...
 
Chitosan capped Silver nanoparticles used as Pressure sensors
Chitosan capped Silver nanoparticles used as Pressure sensorsChitosan capped Silver nanoparticles used as Pressure sensors
Chitosan capped Silver nanoparticles used as Pressure sensors
 
Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...
Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...
Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...
 
“Influence of Behavioral Biases on Cognitive Abilities”
“Influence of Behavioral Biases on Cognitive Abilities”“Influence of Behavioral Biases on Cognitive Abilities”
“Influence of Behavioral Biases on Cognitive Abilities”
 
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...
 
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous WorkoutChanges During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous Workout
 

Similar to An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET

Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksijujournal
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
 
21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
 
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...IJMER
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 

Similar to An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET (20)

Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networks
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
A41040105
A41040105A41040105
A41040105
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Load balancing in mobile adhoc network (MANET)
Load balancing in mobile adhoc network (MANET)Load balancing in mobile adhoc network (MANET)
Load balancing in mobile adhoc network (MANET)
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. II (Jan. 2014), PP 75-79 www.iosrjournals.org www.iosrjournals.org 75 | Page An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET Sara Aliabadi¹, Mehdi Agha Sarram¹ ¹Department of Computer Science, Islamic Azad University Science and Research Branch Yazd, Yazd, Iran Abstract: Based on mobile nature in MANET, there is no doubt that all routing protocols have some route errors. Usually, routing protocols try to recover a route after a route error has been happened on an exact route to destination. This kind of route recovery could make more packet loss and also more time waste. This project adds Triangular Fuzzy Numbers to prediction of route errors and make route recovery as parallel of packet sending. Indeed, any node in this project uses a route error counter and an error prediction based on Fuzzy algorithm to recover its routes before an exact route error on its route discovery has been happened. There is no doubt that using suggested prediction cannot solve all route errors; but it could help routing protocols to improve their route recovery algorithm.This project uses DSR as one of the standard MANET routing protocols to simulate the results. Keywords: MANET, Fuzzy, Triangular Numbers, DSR, Routing I. Introduction A wireless mobile ad hoc network (MANET) is a particular type of wireless network in which an association of mobile nodes forms a multi-hop radio temporary network in a decentralize manner without any support of a fixed infrastructure. Each mobile node acts as both a terminal and a router, and the control of the network activity is distributed to these nodes. Mobile nodes communicate over wireless links which typically have less bandwidth than wired networks. In addition, mobile nodes have lower battery power and lower computation ability. The network topology is generally dynamic because the connectivity among the nodes may change with time due to nodal mobility, the effect ofradio communication, and power limitations. Thesefeatures of MANET have posed a lot of challenges indesigning an effective, reliable and scalable routingprotocol. Lost routes recovery is one of the major challenges in MANET routing protocols which could make a route more or less effective on packet loss during packet sending. Usually, routing protocols in MANET provide route error to inform other nodes that a node is gone and route through that node are not usable any more. In this case, node will recover their routes after a route error has been happened. Thus, packets which are sent during route recovery will lose. A fuzzy number is a quantity whose value is imprecise, rather than exact as is the case with "ordinary" (single-valued) numbers. Any fuzzy number can be thought of as a function whose domain is a specified set (usually the set of real numbers, and whose range is the span of non-negative real numbers. Triangular Fuzzy Numbers use three sets of value to estimate the average situation of any system. First part of this article is to explain DSR and how it works. Then, the second part is going to determine Fuzzy Triangular Numbers and project suggestion to predict route error. Finally, we simulate our findings by NS2 to prove our recovery improvement on MANET routing. II. DSR A Mobile Ad Hoc Network, also called a MANET, is an autonomous collection of mobile nodes forming a dynamic wireless network. The administration of such a network is decentralized. In this kind of network each node acts both as host and router and forwards packets for nodes that are not within transmission range of each other. A MANET provides a practical way to rapidly build a decentralized communication network in areas where there is no existing infrastructure or where temporary connectivity is needed. The changing topology of MANETs and use of the wireless medium justify the need fordifferent routing protocols than those developed for wired networks or multi-cell environments.Various routing protocols have been proposed in the IETF MANET working group to addressthe problem of decentralized routing. The Dynamic Source Routing (DSR) protocol was designed especially for MANET applications. Its main feature is that every data packet follows the source route stored in its header. This route gives the address of each node through which the packet should be forwarded in order to reach its final destination. Each node on the path has a routing role and must transmit the packet to the next hop identified in the source route.
  • 2. An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET www.iosrjournals.org 76 | Page Each node maintains a Route Cache in which it stores every source route it has learned. When a node needs to send a data packet, it checks first its route cache for a source route to the destination. If no route is found, it attempts to find one using the route discovery mechanism. A monitoring mechanism, called route maintenance, is used in each operation along a route. This mechanism checks the validity of each route used. The route maintenance mechanism ensures that the paths stored in the route cache are valid. If the data link layer of a node detects a transmission error, the node creates a Route Error packet and transmits it to the original sender of the data packet. This Route Error packet indicates which link is “broken”. When a node receives a Route Error packet, it removes the link in error from its route cache and for each route containing this link, truncates the route from the hop before the broken link. III. Fuzzy Triangular Numbers and Recovery Algorithm Route updating can help routing protocols to reduce packet loss and improve QoS. Indeed, MANETs have a mobile nature; so topology changes in them frequently. This mobile nature effects on the routes and make them unusable after a while. So, all MANET routing protocols need a route updating algorithm. In this project, we use Triangular Fuzzy Numbers to make the route updating time dependent. In this case, we forecast a time for route updating and make this time error dependent based on Triangular Numbers. If the route error came from a direct node in a route, other nodes will update that route immediately. Otherwise, nodes which received route error will increase their route error counter and operate triangular equation. The result of Triangular equation should multiply to forecast time and subtract from it. In order to consider the fuzzy route recovery using the triangular fuzzy numbers which were based on statistical data, we need the following definitions. Definition 1: A fuzzy set is called a level α fuzzy interval, where 0 ≤ α ≤ 1 and we denote it by [p,q;α], if its membership function is: [ ]( ) { (1) Definition 2: ã is called a fuzzy point, if its membership function on R = (− ∞, ∞) is ( ) { (2) The family of all fuzzy sets on R which we denote as satisfies the following two conditions. Let D∈Fs. ThenDsatisfies ( ) and ( ) below. ( ) The left and right hand side of the α-level set of D, ( ) and ( ) exist. We denoteit as D(α) = [ ( ) ( )]. ( ) ( ) and ( ) are integrable for α ∈ [0, 1]. By using Triangular definition, we can reach the following equation to guess when a route protocol should update or recover its route table. ( ) { ∈ ( ] ∈ ( ] (3) By using equation 3, we can divide mobile network errors to five parts. First, if the error comes from exact node on the route, other nodes will recover their routes immediately. Otherwise, they count the route errors and put the counter in equation 3. In this case, if the route errors were less than a, the network is safe and they do recovery as usual. While, if the route errors go over than a and less than m, they will multiply the result of equation 3 to their usual recovery time and subtract the result from left recovery time. It will be same for route errors which are more than m and less than b. For route errors which are more or equal by b, the network is not safe and nodes will recover their route immediately. Note that, in this case, the route error counter will be change to zero after any route recovery. IV. Simulation Results We addour findings on DSR and simulated it by NS2 for 5, 10, 15, 20, 25, 30, 35, and 40 nodes. Whereas every simulation results may have some exceptions, we simulated the F-DSR in some times and made our decision based on their average. 1.1 End to End Delay End to End Delay is the most important result to prove the success of each routing protocol. The results of simulation show that the F-DSR works more proper than standard DSR. We can see that the End to End Delay in F-DSR is less than Standard DSR. Also, F-DSR has more success during node population increment.
  • 3. An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET www.iosrjournals.org 77 | Page 1.2 Packet Delivery Rate Packet Delivery Rate is our final comparison between F-DSR and Standard DSR. There is no doubt that the results of simulation show that the packet delivery rate increased in F-DSR compare on Standard ones. V. Conclusion Based on MANET mobility nature, there is always some route errors during packet sending. Usually, MANET routing protocols recover their routes after a route error has been happened. This kind of route recovery may cause to increase packet loss during packet sending. In this project we added Fuzzy Triangular Numbers into routing protocols in MANET to predict route errors and do route update in parallel of packet sending. For simulating our findings, we added our error prediction in DSR and simulated it by NS2. The results show that our route recovery algorithm can help DSR to reduce packet loss percentage and end to end delay by parallel route recovery. Reference [1] Abdullah, J., (2010), Multiobjectives GA-Based QOS Routing Protocol for Mobile Ad Hoc Network, International Journal of Grid and Distributed Computing, 3(4), 57-68. [2] Aghdasi, H. S., Torabi, N., Rahmanzadeh, A., Aminiazar, M., and Abbaspour, M., (2012), Usefulness of multicast routing protocols for vehicular Ad-hoc networks, Sixth International Symposium Telecommunications (IST), 459-463. [3] Ahn, Ch. W., and Ramakrishna, R. S., (2002), A Genetic Algorithm for Shortest Path Routing Problem and the Sizing of Populations, IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 6(6), 132-138. [4] Ahn, Ch., W., and Ramakrishna, R., S., (2002), A Genetic Algorithm for Shortest Path Routing Problem and the Sizing of Populations, IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 6(6), 566-579. [5] Al-Ghazal, M., El-Sayed, A., and Kelash, H., (2007), Routing Optimlzation using Genetic Algorlthm in Ad Hoc Networks, IEEE International Symposium on Signal Processing and Information Technology, 497-503. [6] Alzate, M., A., Salamanca, M., P., Pena, N., M., and Labrador, M., A., (2007), End-to-End Mean Bandwidth Estimation as a Function of Packet Length in Mobile Ad Hoc Networks, IEEE, 415-420. [7] Anand, V., Sairam, N., and Thiagajan, M., (2012), A Review of Routing in Ad Hoc Networks, Research Journal of Applied Sciences, Engineering and Technology, 4(8), 981-986. [8] Artimy, M., M., Robertson, W., and Philips, W., j., (2006), Assignment of Dynamic Transmission Range Based on Estimation of Vehicle Density, Engineering Mathematics and Internetworking, 40-48. [9] Barati, J., (2011), Evaluation of intelligent algorithms in Routing Mobile Ad hoc Networks, Mashhad PayamNour University. [10] Barolli, A., Takizawa, M., Xhafa, F., and Barolli, L., (2010), Application of Genetic Algorithms for QoS Routing in Mobile Ad-Hoc Networks: A Survey, International Conference on Broadband, Wireless Computing, Communication and Applications, 250-259. 0 0.5 1 1.5 5 10 15 20 25 30 35 Time(Sec) Number Of Nodes End to End Delay DSR F-DSR 0 20 40 60 80 100 120 5 10 15 20 25 30 35 40 Time(Sec) Number of Nodes Packet Delivery Rate (% Successed Packets / Number of Nodes) DSR F-DSR
  • 4. An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET www.iosrjournals.org 78 | Page [11] Barolli, L., Koyama, A., and Shiratori, N., (2003), A QoS Routing Method for Ad-Hoc Networks Based on Genetic Algorithm, International Workshop on Database and Expert Systems Applications, 14, 1-5. [12] Chiang, Ch,.Gerla, M., and Zhang, L., (1998), Forwarding Group Multicast Protocol (FGMP) for Multihop, Mobile Wireless Networks, CLUSTER COMPUTING, 1-16. [13] Deb, K., Dhebar, Y., D., and Pavan, N., V., R., (1998), Non-Uniform Mapping in Binary-Coded Genetic Algorithms, Kanpur Genetic Algorithms Laboratory (KanGAL). [14] Denardin, G., W., Barriquello, C. H., Campos, A., and Prado, R. N., (2011), A Geographic Routing Hybrid Approach for Void Resolution in Wireless Sensor Networks, Journal of Systems and Software, 10(84), 1577-1590. [15] Du, K., and Yang, Y., (2010), A QoS routing for Maximum Bandwidth in Ad Hoc Networks, International Conference on Future Networks, 343-345. [16] Duncan, N., and Eddie, B. T., (2012), An Energy-Efficient Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks, International Journal of Computing and ICT Research, 2(6), 23-32. [17] Fuhrmann, Th., Pengfei, D., Kutzner, K., and Cramer, C., (2006), Pushing Chord into the Underlay: Scalable Routing for Hybrid MANETs (PDF). System Architecture Group, Technical University of Karlsruhe (TH). [18] Gani, A., Han, Q., Anuar, N. B., and Zakaria, O., (2009), Enhancing DSR Protocol Performance in Mobile Ad-Hoc Networks Using ACK Reply, WSEAS Transactions on Communications, 2(8), 227-236. [19] Goyal, M., Soperi, M., Bacceli, E., Chaudhury, G., Shahik, A., Hosseini, H., and Trivedi, K., (2012), Improving Convergence Speed and Scalability in OSPF: A Survey, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 14(2), 443-463. [20] Grover, D., and Singh, G., (2012), Implementation: DSR & AODV, International Journal of Computer Application, 2(5), 66-79. [21] Guizani, B., Ayeb, B., Koukam, A., (2012), A New Cluster-Based Link State Routing for Mobile Ad Hoc Networks, IEEE, The 2nd International Conference on Communications and Information Technology (ICCIT): Communication Networks and Systems, Hammamet, 2 , 196-201. [22] Gujral, R., Rana, S., and Chaudhari, A., (2012), Study and Comparison of Mesh and Tree Based Multicast Routing Protocols for MANETs, International Journal of Latest Trends in Engineering and Technology (IJLTET), 1(2), 58-65. [23] Gulati, M., K., and Kumar, K., (2013), A Review of QoS Routing Protocols in MANETs, International Conference on Computer Communication and Informatics, 1-6. [24] Hao, L., (2009), The QoS Routing Protocol in the Ad Hoc Networks, International Conference on Networking and Digital Society, 101-103. [25] Hosseini Seno, S. A., Budiarto, R., and Wan, T. Ch., (2011), A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority, Arabian Journal for Science and Engineering, 2(36), 245-257. [26] Hwang, R., H., Do, W., Y., and Yang, Sh., Ch., (2000), Multicast Routing Based on Genetic Algorithms, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 16, 885-902. [27] Johnson, D., B., Maltz, D., A., and Broch, J., (2001), DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, Monarch, 1-25. [28] Johnson, D., Hu, Y., and Maltz, D., (2007), The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 (RFC 4728), IETF, 1-107. [29] Karibasappa, A., S., G., and Muralidhara, K., N., (2011), Neuro Fuzzy Based Routing Protocol for Mobile Ad-Hoc Networks, International Conference on Industrial and Information Systems, 6, 216-221. [30] Katoch, Sh., and Aggarwal, R., (2013), Enhancement in DSR Protocol for Load Balancing and Congestion Control, Global Journal of Computer Science and Technology Network, Web and Security, 7(13), [31] Kaur, N., and Singh, M., (2012), Effects of Caching on the Performance of DSR Protocol, IOSR Journal of Engineering (IOSRJEN), 2(9), 7-11. [32] Kojic, N., S., Ivancic, M., B., Z., Reljin, I., S., and Reljin, B., D., (2010), New Algorithm for Packet Routing in Mobile Ad-hoc Networks, JOURNAL OF AUTOMATIC CONTROL, UNIVERSITY OF BELGRADE, 20, 9-16. [33] kosko, B., (1993), Fuzzy Thinking, Hyperion, New York. [34] Kumar, M. and Mishra, R. (2012), An Overview of MANET: History, Challenges and Applications, Indian Journal of Computer Science and Engineering (IJCSE), 3, 121-125. [35] Kunz, Th., and Alhalimi, R., (2010), Energy-efficient proactive routing in MANET: Energy metrics accuracy, Ad Hoc Networks, 7(8), 755-766. [36] Latiff, L., A., and Fisal, N., (2003), Routing Protocols in Wireless- Mobile Ad Hoc Network - A Review, IEEE, 600-604. [37] Liu, H., Li, J., Zhang, Y., Q., and Pan, Y., (2005), An Adaptive Genetic Fuzzy Multi-path Routing Protocol for Wireless Ad-Hoc Networks, International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, 6, 1-8. [38] Lou, Y., Zhang, W., and Hu, Y., (2010), A New Cluster Based Routing Protocol for VANET, Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 48, 176-180. [39] Michalewicz, Z., (2001), Genetic Algorithms, Numerical Optimization, and Constraints, Polish Academia of Science, 1-8. [40] Mohammed, A., A., and Nagib, G., (2012), Optimal Routing In Ad-Hoc Network Using Genetic Algorithm, Int. J. Advanced Networking and Applications, 3(5), 1323-1328. [41] Nallusamy, R., Duaiswamy, K., Muthukumar, D., and Sathiakumar, C., (2010), Energy efficient dynamic shortest path routing in Wireless Ad hoc Sensor Networks using Genetic Algorithm, ICWCSC. [42] Perkins, Ch., E., and Royer, E., M., (1997), Ad-hoc On-demand Distance Vector Routing, IEEE, 1-11.Perkins, Ch., E., and Royer, E., M., (2003), Ad hoc On-Demand Distance Vector (AODV) Routing (RFC 3561), IETF, 1-37. [43] Ragunath, V., (2004), Implementation of DSR Protocol in NS2 simulator, University of Bonn, Informatik Department IV, 1-5. [44] Ramesh, V., Subbaiah, P., and Supriya, K., (2010), Modified DSR (Preemptive) to Reduce Link Breakage and Routing Overhead for MANET Using Proactive Route Maintenance (PRM), Global Journal of Computer Science and Technology, 5(9), 124-129. [45] Rifa-Pous, H., and Herrera-Joancomarti, J., (2011), Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices, Future Internet, 3, 31-48. [46] Roshankar, R., Bhatia, R., Shrivatava, V., and Sharma, D., K., (2012), Performance Analysis of Various Routing Protocols (Proactive and Reactive) for Random Mobility Models of Adhoc Networks, Recent Advances in Information Technology, 1, 1-5. [47] Royer, E., M., (1999), A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, IEEE Personal Communications, 99 , 46-55. [48] Saeed, N., H., Abbod, M., F., and Al-Raweshidy, H., S., (2012), MANET Routing Protocols Taxonomy, International Conference on Future Communication Networks, 123-128. [49] Saleh, R., O., M., Saman, M., Y., M., and Rahman, M., N., A., (2012), Fresh Shortest Route Algorithm for DSR Protocol in Mobile Ad-Hoc Networks, International Annual Symposium on Sustainability Science and Management, 11, 1068-1073.
  • 5. An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET www.iosrjournals.org 79 | Page [50] Sarr, Ch., Chaudet, C., Chelius, G., and Lassous, I., G., (2005), A node-based available bandwidth evaluation in IEEE 802.11 ad hoc networks, International Journal of Parallel, Emergent and Distributed Systems, 1-21. [51] Sihai, Zh., Layuan, L., and Yong, L. (2011), A QoS-based Routing Algorithm in Ad Hoc Network, International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 10, 23-26. [52] Tan, K., Zhang, Q., and Zhu, W., (2003), Shortest Path Routing in Partially Connected Ad Hoc Networks, GLOBECOM, 1038- 1042. [53] Tong, F., Tang, W., Peng, L., Xie, R., Yang, W., and Kim, Y., (2010), A Node-Grade Based AODV Routing Protocol for Wireless Sensor Network, 2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2, 180-183. [54] Wismanath, K., Obraczka, K., and Tsudik, G., (2005), Exploring Mesh- and Tree Based Multicast Routing Protocols for MANETs, 1-45. [55] Wu, H., and Jia, X., (2007), QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad hoc networks, FFCSA, 559-612. [56] Xiaochuan, X., Gang, W., Keping, W., Gang, W., and Shilou, J., (2009), Link reliability based hybrid routing for tactical mobile ad hoc network, Journal of Systems Engineering and Electronics, 2(19),259-267. [57] Yeh, Ch., T., (2009), Approximations by interval, triangular and trapezoidal fuzzy numbers, IFSA-EUSFLAT, 143-148. [58] Zafar, H., Hassan, L., Khattak, A., Mufti, Z., and Jan, S., (2012), Implementation of the Dynamic Source Routing Protocol in Network Simulator 2 – An Overview, SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES), 44(3), 491-496.